MikroTik Changelogs
← Back to search All components

Component: ike1

101 changelog entries across 67 version(s)

Releases by channel (stacked)

7.22 Stable 2026-Mar-09 (1 month ago)
  • added ChaCha20-Poly1305 ESP encryption support;
7.22rc1 Testing 2026-Feb-06 (2 months ago)
  • added ChaCha20-Poly1305 ESP encryption support;
7.21beta3 Testing 2025-Oct-14 (6 months ago)
  • fixed an issue where policies could be released too early before re-acquisition;
7.20.1 Stable 2025-Oct-10 (6 months ago)
  • fixed an issue where policies could be released too early before re-acquisition;
7.16 Stable 2024-Sep-20 (1 year ago)
  • removed unsupported NAT-D drafts with invalid payload numbers;
7.16beta1 Testing 2024-Jun-05 (1 year ago)
  • removed unsupported NAT-D drafts with invalid payload numbers;
7.12 Stable 2023-Nov-09 (2 years ago)
  • fixed invalid key length on phase1 negotiation;
  • log an error when non-RSA keys are being used;
7.12rc1 Testing 2023-Oct-05 (2 years ago)
  • fixed invalid key length on phase1 negotiation;
7.11 Stable 2023-Aug-15 (2 years ago)
  • fixed Phase 1 when using aggressive exchange mode (introduced in v7.10);
7.12beta1 Testing 2023-Aug-15 (2 years ago)
  • log an error when non-RSA keys are being used;
7.11rc4 Testing 2023-Aug-11 (2 years ago)
  • fixed Phase 1 when using aggressive exchange mode (introduced in v7.10);
7.9rc1 Testing 2023-Mar-30 (3 years ago)
  • improved service stability when handling non-RSA keys (introduced in v7.9beta4);
7.7 Stable 2023-Jan-12 (3 years ago)
  • disallow "remote-id" setting for identity;
  • fixed XAuth responder trying to recreate phase 1;
  • improved expired IPsec-SA processing;
7.7rc1 Testing 2022-Dec-08 (3 years ago)
  • disallow "remote-id" setting for identity;
7.7beta8 Testing 2022-Nov-23 (3 years ago)
  • fixed XAuth responder trying to recreate phase 1;
7.7beta3 Testing 2022-Oct-26 (3 years ago)
  • improved expired IPsec-SA processing;
6.48 Stable 2020-Dec-22 (5 years ago)
  • fixed "my-id=address" parameter usage together with certificate authentication;
  • fixed 'rsa-signature-hybrid' authentication method;
  • fixed memory leak on multiple CR payloads;
  • fixed policy update with and without mode configuration;
  • rekey phase 1 as responder for Windows initiators;
6.48rc1 Testing 2020-Dec-11 (5 years ago)
  • fixed 'rsa-signature-hybrid' authentication method;
  • fixed memory leak on multiple CR payloads;
6.47.8 Stable 2020-Nov-25 (5 years ago)
  • allow using "my-id" parameter with XAuth;
6.47.6 Stable 2020-Oct-21 (5 years ago)
  • allow using "my-id" parameter with XAuth;
6.48beta48 Testing 2020-Oct-14 (5 years ago)
  • fixed "my-id=address" parameter usage together with certificate authentication;
6.46.7 Long-term 2020-Sep-07 (5 years ago)
  • improved stability when performing policy lookup on non-existant peer;
6.48beta12 Testing 2020-Jul-06 (5 years ago)
  • allow using "my-id" parameter with XAuth;
  • fixed policy update with and without mode configuration;
  • rekey phase 1 as responder for Windows initiators;
6.47 Stable 2020-Jun-02 (5 years ago)
  • added error message when specifying "my-id" for XAuth identity;
  • added support for "UNITY_DEF_DOMAIN" and "UNITY_SPLITDNS_NAME" payload attributes;
  • do not try to keep phase 2 when purging phase 1;
  • improved policy lookup with specific protocol;
  • improved stability when performing policy lookup on non-existant peer;
6.45.9 Long-term 2020-Apr-30 (6 years ago)
  • rekey phase 1 rekeying as responder for Windows initiators;